Quantum Algorithms for the Subset-Sum Problem

Total Page:16

File Type:pdf, Size:1020Kb

Quantum Algorithms for the Subset-Sum Problem Quantum algorithms for the subset-sum problem Daniel J. Bernstein1;2, Stacey Jeffery3, Tanja Lange2, and Alexander Meurer4 1 Department of Computer Science University of Illinois at Chicago Chicago, IL 60607{7045, USA [email protected] 2 Department of Mathematics and Computer Science Technische Universiteit Eindhoven P.O. Box 513, 5600 MB Eindhoven, The Netherlands [email protected] 3 Institute for Quantum Computing, University of Waterloo, Canada [email protected] 4 Ruhr-University Bochum, Horst G¨ortzInstitute for IT-Security [email protected] Abstract. This paper introduces a subset-sum algorithm with heuristic asymptotic cost exponent below 0:25. The new algorithm combines the 2010 Howgrave-Graham{Joux subset-sum algorithm with a new stream- lined data structure for quantum walks on Johnson graphs. Keywords: subset sum, quantum search, quantum walks, radix trees, decoding, SVP, CVP 1 Introduction The subset-sum problem is the problem of deciding, given integers x1; x2; : : : ; xn P and s, whether there exists a subset I of f1; 2; : : : ; ng such that i2I xi = s; i.e., whether there exists a subsequence of x1; x2; : : : ; xn with sum s. Being able to solve this decision problem implies being able to find such a subset if one exists: for n > 1 one recursively tries x1; x2; : : : ; xn−1 with sum s or, if that fails, sum s − xn. The reader should imagine, as a typical \hard" case, that x1; x2; : : : ; xn are n independent uniform random integers in f0p; 1;:::; 2 g, and thatps is chosen as a uniform random integer between (n=2 − n)2n−1 and (n=2 + n)2n−1. The P number of subsets I ⊆ f1; 2; : : : ; ng with i2I xi = s then has a noticeable chance of being larger than 0 but is quite unlikely to be much larger, say larger than n. This work was supported by the National Science Foundation under grant 1018836, by the Netherlands Organisation for Scientific Research (NWO) under grant 639.073.005, by NSERC Strategic Project Grant FREQUENCY, by the US ARO, and by the European Commission under Contract ICT-2007-216676 ECRYPT II. Permanent ID of this document: 797dcbe9c3389410ae4d5ae6dba33ab7. Date: 2013.04.07. 2 Bernstein, Jeffery, Lange, Meurer The subset-sum problem is, historically, one of the first problems to be proven NP-complete. A polynomial-time non-quantum algorithm for the subset-sum problem would violate the standard P 6= NP conjecture; a polynomial-time quantum algorithm for the subset-sum problem would violate the standard NP 6⊆ BQP conjecture. There is, however, a very large gap between polyno- mial time and the time needed for a naive search through all 2n subsets of f1; 2; : : : ; ng. The standard NP 6⊆ BQP conjecture does not rule out faster exponential-time algorithms, or even subexponential-time algorithms, or even algorithms that take polynomial time for most inputs. This paper studies faster exponential-time algorithms. Variations. Often one is interested only in sums of fixed weight, or of limited weight. We are now given integers x1; x2; : : : ; xn, s, and w; the problem is to P decide whether there is a subset I of f1; 2; : : : ; ng such that i2I xi = s and #I = w. In the special case s = 0 with w 6= 0, such a subset I immediately produces a short nonzero vector in the lattice L of vectors v 2 Zn satisfying P x v = 0: specifically, the characteristic function of I is a vector of length p i i i w in L. In many applications this is the shortest nonzero vector in L; in some applications this vector can be found by standard SVP algorithms. n P For s 6= 0 one can instead compute a vector r 2 R satisfying i xiri = s, and then observe that subtracting the characteristic function of I from r produces an element of L. In many applications this is the vector in L closest to r; in some applications this vector can be found by standard CVP algorithms. A variant of the same problem is the central algorithmic problem in coding theory. The input now consists of vectors x1; x2; : : : ; xn, a vector s, and an integer w; these vectors all have the same length and have entries in the field F2 of integers modulo 2. The problem, as above, is to decide whether there is a subset P I of f1; 2; : : : ; ng such that i2I xi = s and #I = w. We do not mean to suggest that these problems are identical. However, the algorithmic techniques used to attack subset-sum problems are among the central algorithmic techniques used to attack lattice problems and decoding problems. For example, the best attack known against code-based cryptography, at least asymptotically, is a very recent decoding algorithm by Becker, Joux, May, and Meurer [4], improving upon a decoding algorithm by May, Meurer, and Thomae [24]; the algorithm of [4] is an adaptation of a subset-sum algorithm by Becker, Coron, and Joux [3], improving analogously upon a subset-sum algorithm by Howgrave-Graham and Joux [17]. There is also a line of work on building cryptographic systems whose security is more directly tied to the subset-sum problem. For example, Lyubashevsky, Palacio, and Segev in [22] propose a public-key encryption system and prove that being able to break it implies being able to solve modular subset-sum problems of the following type: find a random subset I ⊆ f1; 2; : : : ; ng given random P x1; x2; : : : ; xn modulo M and given i2I xi modulo M, where M is roughly (10n log n)n. They claim in [22, Section 1] that \there are currently no known quantum algorithms that perform better than classical ones on the subset sum problem". Quantum algorithms for the subset-sum problem 3 Exponent Quantum Split Algorithm 1 No 1 Brute force 0.5 Yes 1 Quantum search; x2 0.5 No 1/2 Left-right split; x2 0.5 No 1/4 Left-right split with a modulus; x4 0.375 Yes 1/4 Quantum search with a modulus; x4 0.337. No 1/16 Moduli + representations; x5 0.333. Yes 1/3 Quantum left-right split; x2 0.333. Yes 1/2 Quantum walk; x3 0.3 Yes 1/4 Quantum walk with a modulus; x4 0.291. No 1/16 Moduli + representations + overlap; [3] 0.241. Yes 1/16 New; quantum walk + moduli + representations; x5 Table 1.1. Heuristic asymptotic performance of various subset-sum algorithms. An algorithm using 2(e+o(1))n operations is listed as \exponent" e. Contents of this paper. We introduce the first subset-sum algorithm that beats 2n=4. Specifically, we introduce a quantum algorithm that, under rea- sonable assumptions, uses at most 2(0:241:::+o(1))n qubit operations to solve a subset-sum problem. This algorithm combines quantum walks with the central \representations" idea of [17]. Table 1.1 compares this exponent 0:241 ::: to the exponents of other algorithms. One can reasonably speculate that analogous quantum speedups can also be applied to the algorithms of [24] and [4]. However, establishing this will require considerable extra work, similar to the extra work of [24] and [4] compared to [17] and [3] respectively. Cost metric and other conventions. This paper follows the tradition of measuring algorithm cost as the number of bit operations or, more generally, qubit operations. In particular, random access to an array of size 2O(n) is assumed to cost only nO(1), even if the array index is a quantum superposition. We systematically suppress cost factors polynomial in n; our concern is with asymptotic exponents such as the 0:241 ::: in 2(0:241:::+o(1))n. We also assume O(1) that the inputs x1; x2; : : : ; xn; s have n bits. These conventions mean, for example, that reading the entire input x1; x2; : : : ; xn; s costs only 1. Almost all of the algorithms discussed here split size-n sets into parts, either 2 or 3 or 4 or 16 parts, as indicated by the \Split" column in Table 1. Any reasonably balanced split is adequate, but to simplify the algorithm statements we assume that n is a multiple of 2 or 3 or 4 or 16 respectively. The algorithms in this paper are designed to work well for random inputs, particularly in the \hard" case that x1; x2; : : : ; xn; s each have about n bits. Our analyses | like the analyses of state-of-the-art algorithms for integer factoriza- tion, discrete logarithms, and many other problems of cryptographic interest | are heuristic. We do not claim that the algorithms work for all inputs, and we do not claim that what we call the \hard" case is the worst case. Even for ran- dom inputs we do not claim that our analyses are proven, but we do speculate 4 Bernstein, Jeffery, Lange, Meurer that they are provable by an adaptation of the proof ideas stated in [17, eprint version]. Acknowledgments. This work was initiated during the Post-Quantum Cryp- tography and Quantum Algorithms workshop at the Lorentz Center in Novem- ber 2012. We acknowledge helpful discussions with Andris Ambainis, Fr´ed´eric Magniez, Nicolas Sendrier, and Jean-Pierre Tillich. 2 Searches P Define Σ as the function that maps I ⊆ f1; 2; : : : ; ng to i2I xi. Recall that we O(1) assume that x1; x2; : : : ; xn; s have n bits, and that we suppress polynomial cost factors; evaluating Σ therefore has cost 1. The subset-sum problem is the problem of deciding whether there exists I with Σ(I) = s, i.e., whether the function Σ − s has a root.
Recommended publications
  • (R18A0507) Design and Analysis of Algorithms.Pdf
    DESIGN AND ANALYSIS OF ALGORITHMS [R18A0507] LECTURE NOTES B.TECH III YEAR – I SEM (R18) (2020-2021) DEPARTMENT OF INFORMATION TECHNOLOGY MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY (Autonomous Institution – UGC, Govt. of India) Recognized under 2(f) and 12 (B) of UGC ACT 1956 (Affiliated to JNTUH, Hyderabad, Approved by AICTE - Accredited by NBA & NAAC – „A‟ Grade - ISO 9001:2015 Certified) Maisammaguda, Dhulapally (Post Via. Hakimpet), Secunderabad – 500100, Telangana State, India IIIYearB.Tech.IT–ISem L T/P/D C 3 -/-/- 3 (R18A0507) Design And Analysis of Algorithms Objectives: To analyze performance ofalgorithms. To choose the appropriate data structure and algorithm design method for a specifiedapplication. To understand how the choice of data structures and algorithm design methodsimpacts the performance ofprograms. To solve problems using algorithm design methods such as the greedy method,divide and conquer, dynamic programming, backtracking and branch andbound. To understand the differences between tractable and intractableproblems. To introduce P and NPclasses. UNIT I: Introduction-Algorithm definition, Algorithm Specification, Performance Analysis- Space complexity, Time complexity, Randomized Algorithms. Divide and conquer- General method, applications - Binary search, Merge sort, Quick sort, Strassen‟s Matrix Multiplication. UNIT II: Disjoint set operations, union and find algorithms, AND/OR graphs, Connected Components and Spanning trees, Bi-connected components Backtracking-Generalmethod,applications-The8-queenproblem,sumofsubsetsproblem,graphcoloring,
    [Show full text]
  • A Fast Algorithm for Performance-Driven Module Implementation Selection*
    VLSI DESIGN (C) 1999 OPA (Overseas Publishers Association) N.V. 1999, Vol. 10, No. 2, pp. 237-247 Published by license under Reprints available directly from the publisher the Gordon and Breach Science Photocopying permitted by license only Publishers imprint. Printed in Malaysia. A Fast Algorithm for Performance-Driven Module Implementation Selection* EDWARD Y. C. CHENG and SARTAJ SAHNI Department of Computer and Information Science and Engineering, University of Florida, Gainesville, FL 32611-6120 (Received 24 March 1998," In finalform 8 February 1999) We develop an O( p log n) time algorithm to obtain optimal solutions to the p-pin n-net single channel performance-driven implementation selection problem in which each module has at most two possible implementations (2-PDMIS). Although Her, Wang and Wong [1] have also developed an O(p log n) algorithm for this problem, experi- ments indicate that our algorithm is twice as fast on small circuits and up to eleven times as fast on larger circuits. We also develop an O(pnc-l) time algorithm for the c, c > 1, channel version of the 2-PDMIS problem. Keywords and Phrases." Channel density, net span constraint, performance-driven module imple- mentation selection, complexity 1. INTRODUCTION routing problem. Channel routing with rearrange- able pins was studied by Kobayashi and Drozd [3]. In the channel routing problem, we have a routing They proposed a three step algorithm (1) permute channel with modules on the top and bottom of pins so as to maximize the number of aligned pin the channel, the modules have pins and subsets of pairs (a pair of pins on different sides of the chan- pins define nets.
    [Show full text]
  • R COMPUTATIONALLY RELATED PROBLEMS·
    1 r ir SIAM J. COMPUT. Vol. 3. No.4, December 1974 COMPUTATIONALLY RELATED PROBLEMS· SARTAJ SAHNIt Abstract. We look at several problems from areas such as network flows, game theory, artificial intelligence, graph theory, integer programming and nonlinear programming and show that they are \. related in that anyone of these problems is solvable in polynomial time iff all the others are, too. At i present, no polynomial time algorithm for these problems is known. These problems extend the equivalence class of problems known as P-Complete. The problem of deciding whether the class of 1 languages accepted by polynomial time nondeterministic Turing machines is the same as that accepted 1 by polynomial time deterministic Turing machines is related to P-Complete problems in that these two classes of languages are the same iff each P-Complete problem has a polynomial deterministic solution. l In view of this, it appears very likely that this equivalence class defines a class of problems that cannot be solved in deterministic polynomial time. Key words. complexity, polynomial reducibility, deterministic and nondeterministic algorithms, network flows, game theory. optimization, AND/OR graphs 1. Introduction. Cook [3J showed that determining whether the class of languages accepted by nondeterministic Turing machines operating in polynomial time was the same as that accepted by deterministic polynomial time bounded Turing machines was as hard as deciding if there was a deterministic polynomial algorithm for the satisfiability problem of propositional calculas (actually, Cook showed that there was a polynomial algorithm for satisfiability iff the determin­ istic and nondeterministic polynomial time languages were the same).
    [Show full text]
  • Computing Biconnected Components on a Hypercube*
    -- -- COMPUTING BICONNECTED COMPONENTS ON A HYPERCUBE* Jinwoon Woo and Sartaj Sahni University of Minnesota Abstract We describe two hypercube algorithms to ®nd the biconnected components (i.e., blocks) of a connected undirected graph. One is a modi®ed version of the Tarjan-Vishkin algorithm. The two hypercube algorithms were experimentally evaluated on an NCUBE/7 MIMD hyper- cube computer. The two algorithms have comparable performance and ef®ciencies as high as 0.7 were observed. Keywords and phrases Hypercube computing, MIMD computer, parallel programming, biconnected components __________________ * This research was supported in part by the National Science Foundation under grants DCR84-20935 and MIP 86-17374 1 -- -- 2 1. INTRODUCTION In this paper we develop two biconnected component (i.e., block) algorithms suitable for medium grained MIMD hypercubes. The ®rst algorithm is an adaptation of the algorithm of Tarjan and Vishkin [TARJ85]. Tarjan and Vishkin provide parallel CRCW and CREW PRAM implementations of their algorithm. The CRCW PRAM implementation of Tarjan and Vishkin runs in O(logn) time and uses O(n +m) processors. Here n and m are, respectively, the number of vertices and edges in the input connected graph. The CREW PRAM implemen- tation runs in O(log2n) time using O(n 2/log2n) processors. A PRAM algorithm that use p processors and t time can be simulated by a p processor hypercube in O(tlog2p) time using the random access read and write algorithms of Nassimi and Sahni [NASS81]. The CREW PRAM algorithm of [TARJ85] therefore results in an O(log3n) time O(n +m) processor hypercube algorithm.
    [Show full text]
  • Combinatorial Algorithms for Subset Sum Problems
    Combinatorial Algorithms for Subset Sum Problems Dissertation an der Fakult¨atf¨urMathematik der Ruhr-Universit¨atBochum vorgelegt von Ilya Ozerov Erstgutachter: Prof. Dr. Alexander May Zweitgutachter: Prof. Dr. Gregor Leander Tag der m¨undlichen Pr¨ufung:05.02.2016 Contents 1 Introduction 1 2 Consistency Problem 5 2.1 High-Level Idea . .6 2.1.1 NN Problem . .6 2.1.2 zeroAND Problem . .9 2.1.3 A Joint Solution . 12 2.2 Consistency Problem . 15 2.2.1 Preliminaries . 15 2.2.2 Problem and Algorithm . 18 2.2.3 Analysis . 21 2.3 Weight Match Problem . 25 2.3.1 General Case . 25 2.3.2 Random Weight Match Problem . 27 2.4 Nearest Neighbor Problem . 28 2.4.1 Analysis . 29 3 Subset Sum Problem 33 3.1 Generalized Problem . 34 3.1.1 Brute Force . 34 3.1.2 Meet-in-the-Middle . 35 3.2 Random Subset Sum Problem . 36 3.2.1 Tools . 37 3.3 Known Results . 41 3.3.1 Meet-in-the-Middle Resivited . 41 3.3.2 Classical Representations . 42 3.4 Consistent Representations . 51 3.4.1 Group Weight Match Problem . 52 3.4.2 Algorithm . 54 4 Binary Subset Sum Problem 59 4.1 Known Results . 60 4.1.1 Meet-in-the-Middle . 60 4.1.2 Representations I . 60 4.1.3 Representations II . 64 4.2 Novel Results . 68 iv CONTENTS 4.2.1 Consistent Representations I . 68 4.2.2 Consistent Representations II . 71 4.3 Results in Special Groups . 74 4.3.1 Algorithms .
    [Show full text]
  • 40 Faster Pseudopolynomial Time Algorithms for Subset
    Faster Pseudopolynomial Time Algorithms for Subset Sum KONSTANTINOS KOILIARIS, University of Illinois, Urbana-Champaign, USA CHAO XU, Yahoo! Research, USA Given a (multi) set S of n positive integers and a target integer u, the subset sum problem is to decide if there is a subset of S that sums up to u. We present a series√ of new algorithms that compute and return all the realizable subset sums up to the integer u in O˜ (min{ nu,u5/4, σ }),whereσ is the sum of all elements of S ˜ and O hides polylogarithmic factors. We also present a modified√ algorithm for integers modulo m, which computes all the realizable subset sums modulo m in O˜ (min{ nm,m5/4}) time. Our contributions improve upon the standard dynamic programming algorithm that runs in O(nu) time. To the best of our knowledge, the new algorithms are the fastest deterministic algorithms for this problem. 40 The new results can be employed in various algorithmic problems, from graph bipartition to computational social choice. Finally, we also improve a result on covering Zm, which might be of independent interest. CCS Concepts: • Theory of computation → Design and analysis of algorithms; Additional Key Words and Phrases: Subset sum, convolution ACM Reference format: Konstantinos Koiliaris and Chao Xu. 2019. Faster Pseudopolynomial Time Algorithms for Subset Sum. ACM Trans. Algorithms 15, 3, Article 40 (June 2019), 20 pages. https://doi.org/10.1145/3329863 1 INTRODUCTION Given a (multi) set S of n positive integers and an integer target value u,thesubset sum problem is to decide if there is a subset of S that sums up to u.
    [Show full text]
  • Fast Low-Space Algorithms for Subset Sum∗
    Fast Low-Space Algorithms for Subset Sum∗ Ce Jin Nikhil Vyas Ryan Williams MIT MIT MIT [email protected] [email protected] [email protected] February 10, 2021 Abstract We consider the canonical Subset Sum problem: given a list of positive integers a1; : : : ; an and a P target integer t with t > ai for all i, determine if there is an S ⊆ [n] such that i2S ai = t. The well- known pseudopolynomial-time dynamic programming algorithm [Bellman, 1957] solves Subset Sum in O(nt) time, while requiring Ω(t) space. In this paper we present algorithms for Subset Sum with Oe(nt) running time and much lower space requirements than Bellman’s algorithm, as well as that of prior work. We show that Subset Sum can be solved in Oe(nt) time and O(log(nt)) space with access to O(log n log log n + log t) random bits. This significantly improves upon the Oe(nt1+")-time, Oe(n log t)-space algorithm of Bringmann (SODA 2017). We also give an Oe(n1+"t)-time, O(log(nt))-space randomized algorithm, improving upon previous (nt)O(1)-time O(log(nt))-space algorithms by Elberfeld, Jakoby, and Tantau (FOCS 2010), and Kane (2010). In addition, we also give a poly log(nt)-space, Oe(n2t)-time deterministic algorithm. We also study time-space trade-offs for Subset Sum. For parameter 1 ≤ k ≤ minfn; tg, we present a randomized algorithm running in Oe((n + t) · k) time and O((t=k) poly log(nt)) space. As an application of our results, we give an Oe(minfn2="; n="2g)-time and poly log(nt)-space algo- rithm for “weak” "-approximations of Subset Sum.
    [Show full text]
  • Handbook of Approximation Algorithms and Metaheuristics CHAPMAN & HALL/CRC COMPUTER and INFORMATION SCIENCE SERIES
    Handbook of Approximation Algorithms and Metaheuristics CHAPMAN & HALL/CRC COMPUTER and INFORMATION SCIENCE SERIES Series Editor: Sartaj Sahni PUBLISHED TITLES ADVERSARIAL REASONING: COMPUTATIONAL APPROACHES TO READING THE OPPONENT’S MIND Alexander Kott and William M. McEneaney DISTRIBUTED SENSOR NETWORKS S. Sitharama Iyengar and Richard R. Brooks DISTRIBUTED SYSTEMS: AN ALGORITHMIC APPROACH Sukumar Ghosh FUNDAMENTALS OF NATURAL COMPUTING: BASIC CONCEPTS, ALGORITHMS, AND APPLICATIONS Leandro Nunes de Castro HANDBOOK OF ALGORITHMS FOR WIRELESS NETWORKING AND MOBILE COMPUTING Azzedine Boukerche HANDBOOK OF APPROXIMATION ALGORITHMS AND METAHEURISTICS Teofilo F. Gonzalez HANDBOOK OF BIOINSPIRED ALGORITHMS AND APPLICATIONS Stephan Olariu and Albert Y. Zomaya HANDBOOK OF COMPUTATIONAL MOLECULAR BIOLOGY Srinivas Aluru HANDBOOK OF DATA STRUCTURES AND APPLICATIONS Dinesh P. Mehta and Sartaj Sahni HANDBOOK OF SCHEDULING: ALGORITHMS, MODELS, AND PERFORMANCE ANALYSIS Joseph Y.-T. Leung THE PRACTICAL HANDBOOK OF INTERNET COMPUTING Munindar P. Singh SCALABLE AND SECURE INTERNET SERVICES AND ARCHITECTURE Cheng-Zhong Xu SPECULATIVE EXECUTION IN HIGH PERFORMANCE COMPUTER ARCHITECTURES David Kaeli and Pen-Chung Yew +DQGERRNRI$SSUR[LPDWLRQ $OJRULWKPVDQG0HWDKHXULVWLFV Edited by 7HRÀOR)*RQ]DOH] 8QLYHUVLW\RI&DOLIRUQLD 6DQWD%DUEDUD86$ Chapman & Hall/CRC Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2007 by Taylor & Francis Group, LLC Chapman & Hall/CRC is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed in the United States of America on acid-free paper 10 9 8 7 6 5 4 3 2 1 International Standard Book Number-10: 1-58488-550-5 (Hardcover) International Standard Book Number-13: 978-1-58488-550-4 (Hardcover) This book contains information obtained from authentic and highly regarded sources.
    [Show full text]
  • A Faster Pseudopolynomial Time Algorithm for Subset Sum 1
    A Faster Pseudopolynomial Time Algorithm for Subset Sum † Konstantinos Koiliaris∗ Chao Xu Abstract Given a multiset S of n positive integers and a target integer t, the subset sum problem is to decide if there is a subset of S that sums up to t. We present a new divide-and-conquer algorithm that computes all the realizable 4=3 subset sums up to an integer u in Oe(min pnu, u , σ ), where σ is the sum of all elements in S and Oe hides polylogarithmic factors. This result improvesf upon theg standard dynamic programming algorithm that runs in O(nu) time. To the best of our knowledge, the new algorithm is the fastest general deterministic algorithm for this problem. We also present a modified algorithm for finite cyclic groups, which computes all the realizable 5=4 subset sums within the group in Oe(min pnm, m ) time, where m is the order of the group. f g 1 Introduction Given a multiset S of n positive integers and an integer target value t, the subset sum problem is to decide if there is a subset of S that sums to t. The subset sum problem is related to the knapsack problem [11] and it is one of Karp’s original NP-complete problems [25]. The subset sum is a fundamental problem used as a standard example of a problem that can be solved in weakly polynomial time in many undergraduate algorithms/complexity classes. As a weakly NP-complete problem, there is a standard pseudopolynomial time algorithm using a dynamic programming, due to Bellman, that solves it in O(nt) time [2] (see also [9, Chapter 34.5]).
    [Show full text]
  • Oral History Interview with Teofilo F. Gonzalez May 10, 2021 Via Zoom
    Oral History Interview with Teofilo F. Gonzalez May 10, 2021 Via Zoom Conducted by Jeffrey R. Yost Charles Babbage Institute 1 Abstract: This interview was conducted by CBI for CS&E in conjunction with the 50th Anniversary of the University of Minnesota Computer Science Department (now Computer Science and Engineering, CS&E). The interview begins with early biographical discussion and education, and then completing a degree in Computer Science at Instituto Tecnologico y de Estudios Superiores de Monterrey A.C., Mexico. Professor Gonzalez was among the earliest cohorts of Ph.D. students in the young Computer Science Department at the University of Minnesota. He worked under Professor Sartaj Kumar Sahni and discusses him as mentor, as well as work as a TA from Marvin Stein and association with other early faculty members through work or courses such as Professors Bill Franta and Allen Hanson. The interview also addresses Prof. Teo Gonzalez distinguished career at University of Oklahoma, UT-Dallas, and the bulk of his long career at University of California, Santa Barbara. He discusses his trip back to Minnesota after 15 years to give a lecture and how Minnesota and the department changed. He responds to a number of questions about the evolution and scope of his research which includes design and analysis of algorithms, approximation algorithms, message dissemination, job shop scheduling, and other areas. Keywords: Instituto Tecnologico y de Estudios Superiores de Monterrey, Computer Science, University of Minnesota, Penn State University, University of California, Santa Barbara, Approximation Algorithm, Design and Analysis of Algorithms, Job Shop Scheduling, and teaching philosophy.
    [Show full text]
  • NP-Completeness Polynomial Transformation
    Chapter 8 NP and Computational Intractability Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved. 1 8.3 Definition of NP Decision Problems Decision problem. X is a set of strings. Instance: string s. Algorithm A solves problem X: A(s) = yes iff s ∈ X. Polynomial time. Algorithm A runs in poly-time if for every string s, A(s) terminates in at most p(|s|) "steps", where p(⋅) is some polynomial. length of s PRIMES: X = { 2, 3, 5, 7, 11, 13, 17, 23, 29, 31, 37, …. } Algorithm. [Agrawal-Kayal-Saxena, 2002] p(|s|) = |s|8. 3 Definition of P P. Decision problems for which there is a poly-time algorithm. Problem Description Algorithm Yes No Grade school MULTIPLE Is x a multiple of y? 51, 17 51, 16 division RELPRIME Are x and y relatively prime? Euclid (300 BCE) 34, 39 34, 51 PRIMES Is x prime? AKS (2002) 53 51 EDIT- Is the edit distance between Dynamic niether acgggt DISTANCE x and y less than 5? programming neither ttttta # 0 1 1& # 4& " 1 0 0% "1 % Is there a vector x that Gauss-Edmonds % ( % ( $ ' $ ' LSOLVE 2 4 "2 , 2 1 1 1 , 1 satisfies Ax = b? elimination % ( % ( $ ' $ ' $% 0 3 15'( $% 36'( #$0 1 1&' #$1 &' ! ! 4 NP Certification algorithm intuition. Certifier views things from "managerial" viewpoint. Certifier doesn't determine whether s ∈ X on its own; rather, it checks a proposed proof t that s ∈ X. Def. Algorithm C(s, t) is a certifier for problem X if for every string s, s ∈ X iff there exists a string t such that C(s, t) = yes.
    [Show full text]
  • Dense Subset Sum May Be the Hardest
    Dense Subset Sum May Be the Hardest Per Austrin1, Petteri Kaski2, Mikko Koivisto3, and Jesper Nederlof4 1 School of Computer Science and Communication, KTH Royal Institute of Technology, Sweden [email protected] 2 Helsinki Institute for Information Technology HIIT & Department of Computer Science, Aalto University, Finland [email protected] 3 Helsinki Institute for Information Technology HIIT & Department of Computer Science, University of Helsinki, Finland [email protected] 4 Department of Mathematics and Computer Science, Technical University of Eindhoven, The Netherlands [email protected] Abstract The Subset Sum problem asks whether a given set of n positive integers contains a subset of elements that sum up to a given target t. It is an outstanding open question whether the O∗(2n/2)-time algorithm for Subset Sum by Horowitz and Sahni [J. ACM 1974] can be beaten in the worst-case setting by a “truly faster”, O∗(2(0.5−δ)n)-time algorithm, with some constant δ > 0. Continuing an earlier work [STACS 2015], we study Subset Sum parameterized by the maximum bin size β, defined as the largest number of subsets of the n input integers that yield the same sum. For every > 0 we give a truly faster algorithm for instances with β ≤ 2(0.5−)n, as well as instances with β ≥ 20.661n. Consequently, we also obtain a characterization in terms of the popular density parameter n/ log2 t: if all instances of density at least 1.003 admit a truly faster algorithm, then so does every instance. This goes against the current intuition that instances of density 1 are the hardest, and therefore is a step toward answering the open question in the affirmative.
    [Show full text]